Submissions from 2013
MKBoost: A framework of multiple kernel boosting, Hao XIA and Steven C. H. HOI Journal Article
Orion: A software project search engine with integrated diverse software artifacts, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article
Platform Regulation on Seller Heterogeneity, Ruhai WU and Mei Lin Working Paper
Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article
PSyHCoS: Parameter synthesis for hierarchical concurrent real-time systems, Étienne ANDRÉ, Yang LIU, Jun SUN, Jin Song DONG, and Shang-Wei LIN Conference Proceeding Article
Real-life vehicle routing with non-standard constraints, Wee Leong Lee Conference Proceeding Article
Reviving dormant ties in an online social network experiment, Ee Peng LIM, Denzil CORREA, David LO, Michael FINEGOLD, and Feida ZHU Conference Proceeding Article
Shortlisting Top-K Assignments, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article
Software Internationalization and Localization: An Industrial Experience, Xin XIA, David LO, Feng ZHU, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
Technique for Authenticating H.264/SVC Streams in Surveillance Applications, Wei ZHUO, Robert H. DENG, Jialie SHEN, Yongdong WU, Xuhua DING, and Swee Won LO Conference Proceeding Article
TESLA: An extended study of an energy-saving agent that leverages schedule flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Milind Tambe, and Burcin Becerik-Gerber Journal Article
The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng CHAN, Kiat Wee TAN, Lingxiao JIANG, and Rajesh Krishna BALAN Conference Proceeding Article
The Determinants of Monetary Value of Virtual Goods: An Empirical Study for a Cross-section of MMORPGs, QIU-HONG WANG, Viktor Mayer-Schonberger, and Xue YANG Journal Article
The Evolution of Modular Product Architectures and the Emergence of Platform Ecosystems, C. Jason WOODARD and Eric K. Clemons Conference Paper
Unified modeling language: The teen years and growing pains, J. ERICKSON and Keng SIAU Conference Proceeding Article
Usability of performance dashboards, usefulness of operational and tactical support, and quality of strategic support: A research framework, Bih-Ru LEA and Fiona Fui-hoon NAH Conference Proceeding Article
Usability of performance dashboards, usefulness of operational and tactical support, and quality of strategic support: A research framework, Bih-Ru LEA and Fiona Fui-hoon NAH Conference Proceeding Article
Using case studies to design and deliver technology-centered computing education courses: An innovative approach from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article
Video concept detection by learning from web images: A case study on cross domain learning, Shiai ZHU, Ting YAO, and Chong-wah NGO Conference Proceeding Article
Keystroke Timing Analysis of on-the-fly Web Apps, Chee Meng TEY, Payas GUPTA, Debin GAO, and YAN ZHANG Conference Proceeding Article
Online feature selection for model-based reinforcement learning, Trung Thanh Nguyen, Zhuoru Li, Tomi Silander, and Tze-Yun LEONG Conference Proceeding Article
Data driven modeling based on dynamic parsimonious fuzzy neural network, Mahardhika Pratama, Meng Joo ER, Xiang LI, Richard Jayadi OENTARYO, Edwin Lughofer, and Arifin Imam Journal Article
Adaptive Credit Scoring With Analytic Hierarchy Process, Kwang Yong KOH, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
A Direct Mining Approach To Efficient Constrained Graph Pattern Discovery, Feida ZHU, Zequn ZHANG, and Qiang QU Conference Proceeding Article
A formal semantics for complete UML state machines with communications, Shuang LIU, Yang LIU, Étienne ANDRÉ, Christine CHOPPY, Jun SUN, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article
A latent variable model for viewpoint discovery from threaded forum posts, Minghui QIU and Jing JIANG Conference Paper
A Latent Variable Model for Viewpoint Discovery from Threaded Forum Posts, Minghui QIU and Jing JIANG Conference Proceeding Article
A new unpredictability-based RFID privacy model, Anjia YANG, Yunhui ZHUANG, Duncan S. WONG, and Guomin YANG Conference Proceeding Article
Approximate Inference in Collective Graphical Models, Daniel SHELDON, Tao SUN, Akshat KUMAR, and Thomas G. DIETTERICH Conference Proceeding Article
Approximating the performance of a "Last Mile" transportation system, Hai WANG and Amedeo ODONI Presentation
Architectural Control and Value Migration in Layered Ecosystems: The Case of Open-Source Cloud Management Platforms, Richard TEE and C. Jason WOODARD Conference Paper
A Tool for Designing Business Model Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article
Attribute-based access to scalable media in cloud-assisted content sharing, Yongdong WU, Zhuo Wei, and Robert H. DENG Journal Article
CAMEO: A Middleware for Mobile Advertisement Delivery, Azeem J. KHAN, Kasthuri JAYARAJAH, Dongsu HAN, Archan MISRA, Rajesh Krishna BALAN, and Srinivasan SESHAN Conference Proceeding Article
Collaborative urban logistics – Synchronizing the last mile, Robert DE SOUZA, Mark GOH, Hoong Chuin LAU, Wee-Siong NG, and Puay-Siew TAN Conference Proceeding Article
CUGAR: A model for open innovation in Science and Technology Parks, Arcot Desai NARASIMHALU Journal Article
Demo: SocioPhone: Everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article
Energy-efficient collaborative query processing framework for mobile sensing services, Jin YANG, Tianli MO, Lipyeow LIM, Kai Uwe SATTLER, and Archan MISRA Conference Proceeding Article
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing, Fengjun LI, Bo LUO, Peng LIU, Dongwon LEE, and Chao-Hsien CHU Journal Article
Experiences with Performance Tradeoffs in Practical, Continuous Indoor Localization, Azeem J. KHAN, Vikash RANJAN, Trung-Tuan LUONG, Rajesh Krishna BALAN, and Archan MISRA Conference Proceeding Article
HUNTS: A Trajectory Recommendation System for Effective and Efficient Hunting of Taxi Passengers, Ye DING, Siyuan LIU, Jiansu PU, and Lionel NI Conference Proceeding Article
Improved reachability analysis in DTMC via divide and conquer, Songzheng SONG, Lin GUI, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment, Qian TANG, Leigh L. LINDEN, John S. QUARTERMAN, and Andrew B. WHINSTON Conference Paper
Introducing programmers to pair programming: A controlled experiment, A. S. M. Sajeev and Subhajit DATTA Conference Proceeding Article
Launching generic attacks on iOS with approved third-party applications, Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU Conference Proceeding Article
Mining User Relations from Online Discussions using Sentiment Analysis and Probabilistic Matrix Factorization, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article
Mining user relations from online discussions using sentiment analysis and probabilistic matrix factorization, Minghui QIU, Liu Yang, and Jing JIANG Conference Paper
Mitigating Access-Driven Timing Channels in Clouds using StopWatch, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article
Real Time Event Detection in Twitter, Xun WANG, Feida ZHU, Jing JIANG, and Sujian LI Conference Proceeding Article
Risk balance defense approach against intrusions for network server, Chengpo MU, Meng YU, Yingjiu LI, and Wanyu Zang Journal Article
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song Conference Paper
SocioPhone: Everyday Face-to-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper
Think Twice before you Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks, YAN LI, Yingjiu LI, Qiang YAN, and Robert H. DENG Conference Proceeding Article
T-Watcher: A New Visual Analytic System for Effective Traffic Surveillance, Jiansu PU, Siyuan LIU, Ye DING, Huamin QU, and Lionel NI Conference Proceeding Article
Understanding Sequential Decisions via Inverse Reinforcement Learning, Siyuan LIU, Miguel ARAUJO, Emma BRUNSKILL, Rosaldo ROSSETTI, Joao BARROS, and Ramayya KRISHNAN Conference Proceeding Article
Visual tracking via locality sensitive histograms, Shengfeng HE, Qingxiong YANG, Rynson W.H. LAU, Jian WANG, and Ming-Hsuan YANG Conference Proceeding Article
When Do Consumers Purchase Online?: Based on Inter-Purchase Time, Youngsoo KIM Conference Proceeding Article
Multi-core model checking algorithms for LTL verification with fairness assumptions, Xuan-Linh HA, Thanh Tho QUAN, Yang LIU, and Jun SUN Conference Proceeding Article
Main-stream media behaviour analysis on Twitter: A case study on UK general election, Zhongyu WEI, Yulan HE, Wei GAO, Binyang LI, Lanjun ZHOU, and Kam-Fai WONG Conference Proceeding Article
Accelerating optimistic HLA-based simulations in virtual execution environments, Zengxiang LI, Xiaorong LI, Nguyen Binh Duong TA, Wentong CAI, and Stephen John TURNER Conference Proceeding Article
Analyzing the friendliness of exchanges in an online software developer community, Brendan CLEARY, Margaret-Anne STOREY, Carlos GÓMEZ, Leif SINGER, and Christoph TREUDE Conference Proceeding Article
An architecture for online semantic labeling on UGVS, Arne SUPPE, Luis NAVARRO-SERMENT, Daniel MUNOZ, Drew BAGNELL, and Martial HEBERT Conference Proceeding Article
Anonymous authentication of visitors for mobile crowd sensing at amusement parks, Divyan KONIDALA, Robert H. DENG, Yingjiu LI, Hoong Chuin LAU, and Stephen FIENBERG Conference Proceeding Article
Behind the magical numbers: Hierarchical chunking and the human working memory capacity, Guoqi LI, Ning NING, Kiruthika RAMANATHAN, Wei HE, Li PAN, and Luping SHI Journal Article
Blogging developer knowledge: Motivations, challenges, and future directions, Chris PARNIN, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Cost-Sensitive Double Updating Online Learning and Its Application to Online Anomaly Detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
Demand Forecasting Using a Growth Model and Negative Binomial Regression Framework, Cally Yeru ONG, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
Designing leakage-resilient password entry on touchscreen mobile devices, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Disclosing climate change patterns using an adaptive markov chain pattern detection method, Zhaoxia WANG, Gary LEE, Hoong Maeng CHAN, Reuben LI, Xiuju FU, Rick GOH, Pauline A. W. POH KIM, Martin L. HIBBERD, and Hoong Chor CHIN Conference Proceeding Article
Distributed Gibbs: A memory-bounded sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, and Hoong Chuin LAU Conference Proceeding Article
Dynamic synthesis of local time requirement for service composition, Tian Huat TAN, Étienne ANDRÉ, Jun SUN, Yang LIU, Jin Song DONG, and Manman CHEN Conference Proceeding Article
Efficient extraction of JSON information in SAS using the SCANOVER function, Murphy CHOY and Kyong Jin SHIM Conference Proceeding Article
Enabling generative, emergent artificial culture, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Conference Proceeding Article
Energy-Neutral Scheduling and Forwarding in Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Weng Seng SOH, and Hwee-Pink TAN Journal Article
Enhancing robot perception using human teammates, Jean OH, Arne SUPPE, Anthony STENTZ, and Martial HEBERT Conference Proceeding Article
Expressive Search on Encrypted Data, Junzuo LAI, Xuhua ZHOU, Robert H. DENG, Yingjiu LI, and Kefei CHEN Conference Proceeding Article
FANS: Face annotation by searching large-scale web facial images, Steven HOI, Dayong WANG, I Yeu CHENG, Elmer LIN, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article
Fragmented social media: A look into selective exposure to political news, Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article
Hybrid Mechanism for Heterogeneous E-Procurement Involving a Combinatorial Auction and Bargaining, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article
Impact of Multimedia in Sina Weibo: Popularity and Life Span, Xun ZHAO, Feida ZHU, Weining QIAN, and Aoying ZHOU Conference Proceeding Article
Implementation of Slowly Changing Dimension to Data Warehouse to Manage Marketing Campaigns in Banks, Lihui WANG, Junyu CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
It Is Not Just What We Say, But How We Say Them: LDA-based Behavior-Topic Model, Minghui QIU, Feida ZHU, and Jing JIANG Conference Proceeding Article
Leakage resilient authenticated key exchange secure in the auxiliary input model, Guomin YANG, Yi MU, Willy SUSILO, and Duncan S. WONG Conference Proceeding Article
Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, Lwin Khin SHAR, Hee Beng Kuan TAN, and Lionel C. BRIAND Conference Proceeding Article
ONESPACE: Shared depth-corrected video interaction, David LEDO, Bon Adriel ASENIERO, Sebastian BORING, and Anthony TANG Conference Proceeding Article
OR-AHaD: An Opportunistic Routing Algorithm for Energy Harvesting WSN, Sanam Shirazi BEHESHTIHA, Hwee-Pink TAN, and Masoud SABAEI Book Chapter
Personal informatics in chronic illness management, Haley MACLEOD, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article
R-energy for evaluating robustness of dynamic networks, Ming GAO, Ee Peng LIM, and David LO Conference Proceeding Article
Retweeting: An act of viral users, susceptible users, or viral topics?, Tuan-Anh HOANG and Ee Peng LIM Conference Proceeding Article
Tag Recommendation in Software Information Sites, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
TESLA: An Energy-saving Agent that Leverages Schedule Flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Burcin Becerik-Gerber, and Milind Tambe Conference Proceeding Article
The application of decision tree to intensity change classification of tropical cyclones in western North Pacific, Wei ZHANG, Si GAO, Bin CHEN, and Kai CAO Journal Article
Tower of babel: a crowdsourcing game building sentiment lexicons for resource-scarce languages, Yoonsung HONG, Haewoon KWAK, Youngmin BAEK, and Sue. MOON Conference Proceeding Article
Traditional media seen from social media, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article
Unified entity search in social media community, Ting YAO, Yuan LIU, Chong-wah NGO, and Tao MEI Conference Proceeding Article
Using non-graded formative online exercises to increase the students’ motivation and performance in classroom: A longitudinal study from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article
Vehicle localization along a previously driven route using an image database, Hideyuki KUME, Arne SUPPE, and Arne SUPPE Conference Proceeding Article